A Scoping Review of Literature on Deep Learning Techniques for Face Recognition

被引:3
作者
Nemavhola, Andisani [1 ]
Viriri, Serestina [2 ]
Chibaya, Colin [3 ]
机构
[1] Univ Johannesburg, Sch Consumer Intelligence & Informat Syst, Johannesburg, South Africa
[2] Univ Kwazulu Natal, Sch Math Stat & Comp Sci, Durban, South Africa
[3] Sol Plaatje Univ, Sch Nat & Appl Sci, Kimberley, South Africa
关键词
SECURITY;
D O I
10.1155/hbe2/5979728
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Deep learning has led to the creation of facial recognition technologies using convolutional neural networks (CNNs). This preliminary study explores the application of CNN architectures in face recognition to gain a deeper understanding of the challenges and methodologies in the field. The study systematically reviewed relevant literature using the Preferred Reporting Items for Systematic reviews and Meta-Analyses extension for Scoping Reviews (PRISMA-ScR) framework. Out of 3622 eligible papers, 266 were included in the review, with 47% proposing new techniques and 1% focusing on method implementation and comparison. Most studies used images rather than video as training or testing data, with 78% using clean data and only 7% utilizing occluded and clean data. It was observed that traditional CNN architectures were predominantly employed. The study identified a lack of research on the implementation and definition of CNN architectures, the development of facial recognition models using both clean and occluded images and videos, and the exploration of nontraditional CNN architectures. The challenges affecting facial recognition included occlusion, distance from the camera, camera angle, and lighting conditions. This preliminary assessment provides an insight into the use of CNN in face recognition and suggests that nontraditional CNN architectures could be further explored in future research.
引用
收藏
页数:14
相关论文
共 57 条
[1]   COVID-19 masks increase the influence of face recognition algorithm decisions on human decisions in unfamiliar face matching [J].
Barragan, Daniela ;
Howard, John J. ;
Rabbitt, Laura R. ;
Sirotin, Yevgeniy B. .
PLOS ONE, 2022, 17 (11)
[2]   Face recognition technology: Security versus privacy [J].
Bowyer, KW .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2004, 23 (01) :9-20
[3]   A General Survey on Attention Mechanisms in Deep Learning [J].
Brauwers, Gianni ;
Frasincar, Flavius .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (04) :3279-3298
[4]  
Brey Philip., 2004, J. Inform. Commun. Ethics Soc, V2, P97, DOI DOI 10.1108/14779960480000246
[5]  
Cho KYHY, 2014, Arxiv, DOI [arXiv:1406.1078, DOI 10.48550/ARXIV.1406.1078]
[6]  
Cord M, 2008, COGN TECHNOL, P1, DOI 10.1007/978-3-540-75171-7
[7]  
Dayan Peter., 1999, The MIT Encyclopedia Of The Cognitive Sciences
[8]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, 10.48550/arXiv.1810.04805]
[9]  
Dong L., 2018, 2018 IEEE INT C ACOU, p5884 5888, DOI [10.1109/ICASSP.2018.8462506,2-s2.0-85054278160, DOI 10.1109/ICASSP.2018.8462506,2-S2.0-85054278160]
[10]  
Durga P., Gabor-deep CNN based masked face recognition for fraud prevention, P990, DOI [10.1109/ICCMC51019.2021.9418044, DOI 10.1109/ICCMC51019.2021.9418044]